cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-9792,https://securityvulnerability.io/vulnerability/CVE-2024-9792,D-Link DSL-2750U R5B017 Vulnerable to Cross-Site Scripting Attacks Remotely,"A vulnerability has been identified in the D-Link DSL-2750U router, specifically within its Port Forwarding Page. The issue arises from improper handling of user input in the PortMappingDescription field, allowing remote attackers to execute cross-site scripting (XSS) attacks. This flaw can permit the injection of malicious scripts into web pages viewed by users of the affected device, potentially compromising the confidentiality and integrity of user data. The vulnerability underscores the importance of securing web interfaces and ensuring proper validation and sanitization of input parameters.",D-link,Dsl-2750u,6.1,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-10-10T15:00:12.311Z,0 CVE-2024-0717,https://securityvulnerability.io/vulnerability/CVE-2024-0717,D-Link Good Line Router v2 HTTP GET Request devinfo information disclosure,"A notable vulnerability exists within various D-Link networking devices, particularly impacting the HTTP GET Request Handler component. This flaw enables malicious actors to disclose sensitive information by manipulating arguments in the input area, specifically targeting the '/devinfo' file of the affected devices. The vulnerability can be exploited remotely, making it vital for users to take immediate action to secure their devices. As the exploit has been publicly disclosed, it is crucial for users to ensure their devices are updated and configured correctly to mitigate potential security risks.",D-Link,"DAP-1360,DIR-300,DIR-615,DIR-615GF,DIR-615S,DIR-615T,DIR-620,DIR-620S,DIR-806A,DIR-815,DIR-815AC,DIR-815S,DIR-816,DIR-820,DIR-822,DIR-825,DIR-825AC,DIR-825ACF,DIR-825ACG1,DIR-841,DIR-842,DIR-842S,DIR-843,DIR-853,DIR-878,DIR-882,DIR-1210,DIR-1260,DIR-2150,DIR-X1530,DIR-X1860,DSL-224,DSL-245GR,DSL-2640U,DSL-2750U,DSL-G2452GR,DVG-5402G,DVG-5402GFRU,DVG-N5402G,DVG-N5402G-IL,DWM-312W,DWM-321,DWR-921,DWR-953,Good Line Router v2",5.3,MEDIUM,0.0019600000232458115,false,,false,false,true,2024-01-19T15:31:04.000Z,true,false,false,,2024-01-19T15:31:04.290Z,0 CVE-2021-3708,https://securityvulnerability.io/vulnerability/CVE-2021-3708,OS Command Injection Vulnerability in D-Link DSL-2750U Router,"The D-Link DSL-2750U router is susceptible to an OS command injection exploit due to vulnerabilities in its firmware. An attacker connected to the local network can execute arbitrary operating system commands on the router, potentially compromising network security. This issue can be exploited in conjunction with other vulnerabilities, allowing unauthorized access and manipulation of the device. Users are advised to update their firmware and implement network security measures to safeguard against these risks.",D-link,Dsl-2750u,7.8,HIGH,0.0005300000193528831,false,,false,false,false,,,false,false,,2021-08-16T04:55:13.000Z,0 CVE-2021-3707,https://securityvulnerability.io/vulnerability/CVE-2021-3707,Unauthorized Configuration Modification in D-Link Router by D-Link,"The D-Link DSL-2750U router is susceptible to a vulnerability that enables unauthorized modification of device configuration settings. An attacker on the same local network can exploit this flaw to perform unauthorized changes. If exploited in conjunction with another vulnerability, it may lead to the execution of arbitrary operating system commands on the device, posing significant risks to the network's integrity and security.",D-link,Dsl-2750u,5.5,MEDIUM,0.00046999999904073775,false,,false,false,true,2021-05-29T12:24:04.000Z,true,false,false,,2021-08-16T04:55:11.000Z,0 CVE-2020-13150,https://securityvulnerability.io/vulnerability/CVE-2020-13150,Access Control Weakness in D-Link DSL-2750U Devices,"The D-Link DSL-2750U ISL2750UEME3.V1E devices present a security issue that allows unauthorized access to the control panel for approximately 90 seconds after the device is restarted. During this window, MAC address filtering rules, which are intended to prevent unauthorized device access, are not yet active, exposing the control panel to potential attackers. This behavior can lead to unauthorized changes to device settings, compromising the security and functionality of the network.",D-Link,Dsl-2750u Firmware,7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2020-06-15T15:56:11.000Z,0 CVE-2019-1010155,https://securityvulnerability.io/vulnerability/CVE-2019-1010155,Authentication Bypass in D-Link DSL-2750U by D-Link,"The D-Link DSL-2750U version 1.11 is susceptible to an authentication bypass vulnerability that allows unauthorized access to its login component. Although the access to the wizard does not permit actual configuration, it raises concerns about potential denial of service and information leakage. The community remains divided on the severity of this issue, suggesting that while third-party testing indicates limited exploitability, any unregulated access to network devices can pose a security risk.",D-link,Dsl-2750u,9.1,CRITICAL,0.008249999955296516,false,,false,false,false,,,false,false,,2019-07-23T13:18:36.000Z,0